General
-
Target
code.ps1
-
Size
130B
-
Sample
240704-2lbq2awala
-
MD5
a18ee846019bfeb04eb7f15c2b9fd86a
-
SHA1
71b3b13a9351241124d605681f7d81e56e7ef321
-
SHA256
d38a97f0d4cf8706ecf5da15ff500bddd6a96228c4c2cd65be19afdaee9523db
-
SHA512
4b4bb2e4bb5d968c8079b1cfcefddcd0496b87140fec8d7abfc062633ee3bcd6f76efd9aa794a5b3cdfb2ad33404d7e5ffb9b396c75a3eccf3565bcf5b537f92
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
code.ps1
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
code.ps1
Resource
win11-20240508-en
Malware Config
Extracted
http://185.254.97.190:2024/test.txt
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Targets
-
-
Target
code.ps1
-
Size
130B
-
MD5
a18ee846019bfeb04eb7f15c2b9fd86a
-
SHA1
71b3b13a9351241124d605681f7d81e56e7ef321
-
SHA256
d38a97f0d4cf8706ecf5da15ff500bddd6a96228c4c2cd65be19afdaee9523db
-
SHA512
4b4bb2e4bb5d968c8079b1cfcefddcd0496b87140fec8d7abfc062633ee3bcd6f76efd9aa794a5b3cdfb2ad33404d7e5ffb9b396c75a3eccf3565bcf5b537f92
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-